Robust Two-Factor Authentication

Single use codes delivered by Email and SMS, mobile phone verification using automated phone calls and installed apps, or standalone physical devices - there's more than one way to do 2-factor authentication.

There are benefits and downsides to each. Learn how each one works, and what is best for you and your users. Avoid common mistakes when rolling out 2FA, and take a look at how you can add one, or many, to your application's login's flow.

Tim Lytle

Nexmo

Tim has been a contract developer for the past 10 years, and now is the Developer Evangelist at Nexmo. Having worked on API integration and custom applications, Tim enjoys the Zend Framework, Doctrine2, and well-documented APIs. He’s also the organizer of the Lehigh Valley PHP Meetup.